rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540850731

Secure Transaction Protocol Analysis

by ; ;
  • ISBN13:

    9783540850731

  • ISBN10:

    3540850732

  • Format: Paperback
  • Copyright: 2008-08-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $74.99 Save up to $55.19
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and conflicting beliefs in messages. Chapter 6 integrates data mining with security protocol analysis, and Chapter 7 develops a new technique for detecting collusion attack in securityprotocols. Chapter 8 gives a summary of the chapters and presents a brief discussion of some emerging issues in the field.

Table of Contents

Introductionp. 1
What Is Security Protocol?p. 1
Needs of Formal Analysis for Secure Transaction Protocolsp. 3
Formal Methods and Related Areasp. 5
Emerging Issues and Trendsp. 10
A Brief Discussion on the Chaptersp. 12
Summaryp. 13
Overview of Security Protocol Analysisp. 17
The Formalismp. 17
Basic Notations and Terminologyp. 18
Inference Rulesp. 19
Security Protocolsp. 21
SET Protocolp. 22
Netbill Protocolp. 23
Security Servicesp. 24
Principles of Cryptographyp. 32
Threats in Security Protocolsp. 38
Research into Analysis of Security Protocolsp. 42
A Discussion of Formal Methods and Security Protocolsp. 42
A Brief Introduction to Protocol Abstractionp. 44
A Classification of Approaches for Protocol Analysisp. 47
Attack-Construction Approachp. 52
Approaches by Dolev and Yaop. 52
NRL Protocol Analyserp. 56
Inference-Construction Approachp. 61
BAN Logicp. 61
Extensions to BAN Logicp. 64
Proof-Construction Approachp. 67
Approaches Using Formal Tools and Specification Languagesp. 68
Summaryp. 71
Formal Analysis of Secure Transaction Protocolsp. 73
Introductionp. 73
Research into Verifying Electronic Transaction Protocolsp. 75
Formalism for Protocol Analysis Using Process Calculip. 75
Formal Analysis Using an Observational Transition Systemp. 78
Formal Analysis of Card-Based Payment Systems in Mobile Devicesp. 80
A Computational Modelp. 83
Basic Terms and Statementsp. 86
Logical Framework and Statement of ENDLp. 89
Axiomp. 90
Inference Rulesp. 94
Inference Formatp. 99
Verification Instances of Security Protocols in ENDLp. 99
Summaryp. 106
Model Checking in Security Protocol Analysisp. 107
An Overview of Model Checking in Analysing E-Commerce Protocolsp. 108
Model Checking for Failure Analysis of Protocolsp. 109
Automatic Analysis of E-commerce Protocols Using UMLp. 111
An ENDL-Based Verification Modelp. 113
Componentsp. 113
Designing the Modelp. 114
Handling the Knowledge and Factsp. 117
Recognitionp. 118
Comparison with Theorem Provingp. 125
Discussionp. 127
Summaryp. 129
Uncertainty Issues in Secure Messagesp. 131
Introductionp. 131
Estimation of Inconsistency of Secure Messagesp. 134
Related Workp. 134
Semantics Descriptionp. 137
Measuring Inconsistency in Secure Messagesp. 144
Examples of Measuring Inconsistencyp. 151
Experimentsp. 153
Integration of Conflicting Beliefs in Secure Messagesp. 156
Related Workp. 157
Basic Conceptsp. 159
Handling Inconsistent Beliefs in Secure Messagesp. 165
Experimentsp. 170
Summaryp. 172
Applications of Data Mining in Protocol Analysisp. 175
Introductionp. 175
Related Workp. 177
Basic Conceptsp. 180
Association Rule Mining for Inconsistent Secure Messagesp. 182
The Basics of Association Rule Miningp. 182
Data Preparationp. 184
Identifying Association Rules of Interestp. 186
Algorithms and Experimentsp. 188
Algorithmsp. 188
Experimentsp. 189
Summaryp. 192
Detection Models of Collusion Attacksp. 193
Introductionp. 193
Related Workp. 195
Identification of Frequent Patterns for Collusion Attack Detectionp. 198
Basic Conceptsp. 198
A Framework to Detect Collusion Attacksp. 200
Dealing with Knowledge and Factsp. 202
A Case Studyp. 203
Estimation of the Probability of Collusion Attacksp. 205
Motivationsp. 205
Preliminariesp. 206
Identifying Collusion Attack Using Bayesian Networkp. 208
Experimentsp. 212
Summaryp. 215
Conclusion and Future Worksp. 217
Conclusionp. 217
Future Workp. 219
Referencesp. 223
Indexp. 233
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program